Answer:
b) False.
Explanation:
Port explorers are tools used by both attackers and defenders to identify (or fingerprint) the computers that are active on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, anAn IDPS can be configured to dial a phone number and produce an alphanumeric page or other type of signal or message., is a FALSE statement.
B. Because major shifts in thinking can cause change.
They may invade privacy rights of air space and be used for other unintended acts such a bombings and espionage
Optima battery because it is stronger than a factory battery